Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
R |
2024-07-27 13:20 |
Hokkaido |
|
Optimal Proof-Testing Intervals for E/E/PE Safety-Related Systems Under Safety Constraint Shinji Inoue (Kansai Univ.), Shigeru Yamada (Tottori Univ.) |
(To be available after the conference date) [more] |
|
SP, IPSJ-MUS, IPSJ-SLP [detail] |
2024-06-15 13:50 |
Tokyo |
(Primary: On-site, Secondary: Online) |
[Poster Presentation]
A voice synthesizer operated by fingers to control its vocal-tract area function. Amane Koriki, Masashi Ito (Tohtech) |
(To be available after the conference date) [more] |
|
MW |
2024-06-13 14:20 |
Tokyo |
Hachijomachi-shoko-kai (Primary: On-site, Secondary: Online) |
Formalization of isosceles triangular and isosceles trapezoida membership functions and calculation in fuzzy approximate reasoning Takashi Mitsuishi (Nagano Univ.) |
(To be available after the conference date) [more] |
|
SC |
2024-06-07 15:00 |
Fukushima |
Univ. of Aizu (Primary: On-site, Secondary: Online) |
Reliability testing techniques using pseudo-failures in microservice architectures Yusuke Nishi, Gakuho Taguchi (Hitachi) |
(To be available after the conference date) [more] |
|
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-07 10:30 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") |
Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
(To be available after the conference date) [more] |
|
QIT (2nd) |
2024-05-28 13:00 |
Ibaraki |
AIST Tsukuba |
[Poster Presentation]
On the Convex Optimization Method for POVM Estimation of a Photon-Number-Resolving Detector
-- Estimation Accuracy and Shot Noise -- Akio Yoshizawa (AIST), Daiji Fukuda (AIST/OPERANDO-OIL) |
A measurement in quantum mechanics is characterized using a set of positive semi-definite operators called the POVM (pos... [more] |
|
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-16 17:00 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
Lyapunov Function-Based Approach to Event-Triggered Control with Self-Triggered Sampling for Switched Linear Systems Shota Nakayama, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) WBS2024-6 RCC2024-6 |
In this paper, a Lyapunov-based method of event-triggered control with self-triggered sampling is proposed for switched ... [more] |
WBS2024-6 RCC2024-6 pp.27-31 |
MW |
2024-05-17 13:00 |
Osaka |
Osaka University Toyonaka Campus (Primary: On-site, Secondary: Online) |
Sub-Terahertz illusion metasurfaces using a stretchable elastic substrate with the dynamic anomalous reflection beam shaping functionality Yuki Tankawa, Yosuke Nakata, Atsushi Sanada (Osaka Univ.) MW2024-16 |
We propose illusion meta-anomalous reflectors that dynamically controls both the angle and width of the reflected beam s... [more] |
MW2024-16 pp.46-51 |
NS |
2024-05-09 14:55 |
Mie |
Sinfonia Technology Hibiki Hall Ise (Primary: On-site, Secondary: Online) |
On Ordered Proof of Transit Based on eBPF for Service Function Chaining Takanori Hara (NAIST), Masahiro Sasabe (Kansai Univ.) NS2024-17 |
Service function chaining (SFC) can establish a service path where a set of functions is executed in order given by serv... [more] |
NS2024-17 pp.23-28 |
ICD |
2024-04-12 13:50 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
Development of a Bridge Chip for Scalable Performance and Capacity Storage Systems Shinichi Ikeda, Akira Iwata, Goichi Otomo, Tomoaki Suzuki, Hiroaki Iijima, Mikio Shiraishi, Shinya Kawakami, Masatomo Eimitsu, Yoshiki Matsuoka, Kiyohito Sato, Shigehiro Tsuchiya, Yoshinori Shigeta, Takuma Aoyama (Kioxia) ICD2024-14 |
We describe a Bridge Chip that enables a high-speed, high-capacity storage system. The proposed Bridge Chip employs a fu... [more] |
ICD2024-14 p.43 |
EMCJ, MICT (Joint) |
2024-03-15 14:40 |
Shimane |
|
A Trial for Estimating Lung Age Using Fukimodoshi Blowouts
-- Prototype Results of Electronic Fukimodoshi and State Estimation by Guage Pressure Measurement -- Tetsuo Tsujioka, Sho Sekimoto, Misaki Shinmyo, Hitoshi Watanabe, Yoshimasa Matsuura, Hisayo Yokoyama, Haruka Kawabata (Osaka Metropolitan Univ.), Yoshihiro Yamashina (Aino Univ.) MICT2023-81 |
There is an urgent need for preventive measures against the COPD (Chronic Obstructive Pulmonary Disease). "Lung age" is ... [more] |
MICT2023-81 pp.20-25 |
CAS, CS |
2024-03-14 11:40 |
Okinawa |
|
Multiple Source Localization Method by Multiple Group PSO Kazuki Fujita, Keniji Suyama (Tokyo Denki Univ.) CAS2023-116 CS2023-109 |
A high-resolution single source localization method based on an approximation of the sinc function has been developed. H... [more] |
CAS2023-116 CS2023-109 pp.29-34 |
CAS, CS |
2024-03-15 13:25 |
Okinawa |
|
Service Function Chain Description Scheme in Named Data Networking Haruto Kobayashi, Hidenori Nakazato (Waseda Univ.) CAS2023-132 CS2023-125 |
In recent years, IoT has been utilized in various locations, demanding the construction of more efficient and easily dep... [more] |
CAS2023-132 CS2023-125 pp.116-121 |
KBSE |
2024-03-14 13:20 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
A Method for Representing Non-Functional Requirements based on Exceptions Shuichiro Yamamoto (IPUT in Nagoya) KBSE2023-71 |
In order to prevent information system failures, it is not enough to simply define functional requirements; it is necess... [more] |
KBSE2023-71 pp.37-42 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
[Invited Talk]
Cryptographic Research Based on Algebraic Curve Computation Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 |
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] |
IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98 p.265 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Reconstruction of Boyer quantum algorithm and its application to hash puzzles Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 |
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] |
IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114 pp.358-365 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
IT2023-111 ISEC2023-110 WBS2023-99 RCC2023-93 |
This paper deals with variable-length lossy source coding in which the criteria are a cumulant generating function of co... [more] |
IT2023-111 ISEC2023-110 WBS2023-99 RCC2023-93 pp.238-240 |
IE, MVE, CQ, IMQ (Joint) [detail] |
2024-03-13 10:20 |
Okinawa |
Okinawa Sangyo Shien Center (Primary: On-site, Secondary: Online) |
A study on reproduction of specular reflection using NeRF in dimished reality for AR marker hiding Issa Narutomi, Norihiko Kawai (OIT) IMQ2023-20 IE2023-75 MVE2023-49 |
In games using AR markers, the markers are recognized and 3DCG is synthesized and presented accordingly. However, if the... [more] |
IMQ2023-20 IE2023-75 MVE2023-49 pp.41-44 |
NLP, MSS |
2024-03-14 16:05 |
Misc. |
Kikai-Shinko-Kaikan Bldg. |
Functional Electrical Stimulation Device Using Wireless Sequential Circuit Central Pattern Generator Model Rikuto Nozu, Hiroyuki Torikai (Hosei Univ) MSS2023-97 NLP2023-149 |
In this study, we design a functional electrical stimulator using a wireless sequential logic circuit central pattern ge... [more] |
MSS2023-97 NLP2023-149 p.123 |